Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology

Size: px
Start display at page:

Download "Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology"

Transcription

1 Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed as part of a fugitive apprehension effort, a complex narcotics investigation, or to locate or rescue a kidnapped child, cell-sjte simulators fulfill critical operational needs. As with any law enforcement capability, the Department must use cell-site simulators in a manner that is consistent with the requirements and protections of the Constitution, including the Fourth Amendment, and applicable statutory authorities, including the Pen Register Statute. Moreover, any information resulting from the use of cell-site simulators must be handled in a way that is consistent with the array of applicable statutes, regulations, and policies that guide law enforcement in bow it may and may not collect, retain, and disclose data. As technology evolves, the Department must continue to assess its tools to ensure that practice and applicable policies reflect the Department's law enforcement and national security missions, as well as the Department's commitments to accord appropriate respect for individuals' privacy and civil liberties. Tbis policy provides additional guidance and establishes common principles for the use of cell-site simulators across the Department. 1 The Department's individual law enforcement components may issue additional specific guidance consistent with this policy. BACKGROUND Cell-site simulators, on occasion, have been the subject ofmisperception and confusion. To avoid any confusion here, this section provides information about the use of the equipment and defines the capabilities that are the subject of this policy. Basic Uses Law enforcement agents can use cell-site simulators to help locate cellular devices whose unique identifiers are already known to law enforcement, or to determine the unique identifiers of an unknown device by collecting limited signaling information from devices in the simulator user's vicinity. This technology is one tool among many traditional law enforcement techniques, and is deployed only in the fraction of cases in which the capability is best suited to achieve specific public safety objectives. 1 This policy applies to the use of cell-site simulator technology inside the United States in furtherance of criminal investigations. When acting pursuant to the Foreign Intelligence SmveiUance Act, Department of Justice components will make a probable-cause based showing and appropriate disclosures to the court in a manner that is consistent with the guidance set forth in this policy.

2 How They Function Cell-site simulators, as governed by this policy, function by transmitting as a cell tower. In response to the signals emitted by the simulator, cellular devices in the proximity of the device identify the simulator as the most attractive cell tower in the area and thus transmit signals to the simulator that identify the device in the same way that they would with a networked tower. A cell-site simulator receives and uses an industry standard unique identifying number assigned by a device manufacturer or cellular network provider. When used to locate a known cellular device, a cell-site simulator initially receives the unique identifying number from multiple devices in the vicinity of the simulator. Once the cell-site simulator identifies the specific cellular device for which it is looking, it will obtain the signaling information relating only to that particular phone. When used to identify an unknown device, the cell-site simulator obtains signaling information from non-target devices in the target's vicinity for the limited purpose of distinguishing the target device. What They Do and Do Not Obtain By transmitting as a cell tower, cell-site simulators acquire the identifying information from cellular devices. This identifying information is limited, however. Cell-site simulators provide only the relative signal strength and general direction of a subject cellular telephone; they do not function as a GPS locator, as they do not obtain or download any location information from the device or its applications. Moreover, cell-site simulators used by the Department must be configured as pen registers, and may not be used to collect the contents of any communication, in accordance with 18 U.S.C. 3127(3). This includes any data contained on the phone itself: the simulator does not remotely capture s, texts, contact lists, images or any other data from the phone. In addition, Department cell-site simulators do not provide subscriber account information (for example, an account bolder's name, address, or telephone number). MANAGEMENT CONTROLS AND ACCOUNTABILITY 2 Cell-site simulators require training and practice to operate correctly. To that end, the following management controls and approval processes will help ensure that only knowledgeable and accountable personnel will use the technology. 1. Department personnel must be trained and supervised appropriately. Cell-site simulators may be operated only by trained personnel who have been authorized by their agency to use the technology and whose training has been administered by a qualified agency component or expert. 2 This policy guidance is intended only to improve the internal.tnallagement of the Department of Justice. It is not intended to and does not create any right, benefit, trust, or responsibility, whether substantive or procedural, enforceable at law or equity by a party against the United States, its departments, agencies, instrumentalities, entities, officers, employees, or agents, or any person, nor does it create any right of review in an administrative, judicial, or any other proceeding. 2

3 2. Within 30 days, agencies shall designate an executive-level point of contact at each division or district office responsible for the implementation of this policy, and for promoting compliance with its provisions, within his or her jurisdiction. 3. Prior to deployment of the technology, use of a cell-site simulator by the agency must be approved by an appropriate individual who has attained the grade of a first-level supervisor. Any emergency use of a cell-site simulator must be approved by an appropriate second-level supervisor. Any use of a cell-site simulator on an aircraft must be approved either by the executive-level point of contact for the jurisdiction, as described in paragraph 2 of this section, or by a branch or unit chief at the agency's headquarters. Each agency shall identify training protocols. These protocols must include training on privacy and civil liberties developed in consultation with the Department's Chief Privacy and Civil Liberties Officer. LEGAL PROCESS AND COURT ORDERS The use of cell-site simulators is permitted only as authorized by law and policy. While the Department has, in the past, appropriately obtained authorization to use a cell-site simulator by seeking an order pursuant to the Pen Register Statute, as a matter of policy, law enforcement agencies must now obtain a search warrant supported by probable cause and issued pursuant to Rule 41 of the Federal Rules of Criminal Procedure (or the applicable state equivalent), except as provided below. As a practical matter, because prosecutors will need to seek authority pursuant to Rule 41 and the Pen Register Statute, prosecutors should, depending on the rules in their jurisdiction, either ( 1) obtain a warrant that contains all information required to be included in a pen register order pursuant to 18 U.S.C (or the state equivalent), or (2) seek a warrant and a pen register order concurrently. The search warrant affidavit also must reflect the information noted in the immediately following section ofthis policy ("Applications for Use of Cell-Site Simulators"). There are two circumstances in which this policy does not require a warrant prior to the use of a cell-site simulator. 1. JJxigent Circumstances under the Fourth Amendment Exigent circumstances can vitiate a Fourth Amendment warrant requirement, but cell-site simulators still require court approval in order to be lawfully deployed. An exigency that excuses the need to obtain a warrant may arise when the needs of law enforcement are so compelling that they render a warrantless search objectively reasonable. When an officer bas the requisite probable cause, a variety of types of exigent circumstances may justify dispensing with a warrant. These include the need to protect human life or avert serious injury; the prevention of the imminent destruction of evidence; the hot pursuit of a fleeing felon; or the prevention of escape by a suspect or convicted fugitive from justice. 3

4 In this circumstance, the use of a cell-site simulator still must comply with the Pen Register Statute, 18 U.S.C. 3121, e/ seq., which ordinarily requires judicial authorization before use of the cell-site simulator, based on the government's certification that the information sought is relevant to an ongoing criminal investigation. In addition, in the subset of exigent situations where circumstances necessitate emergency pen register authority pursuant to 18 U.S.C (or the state equivalent), the emergency must be among those listed in Section 3125: immediate danger of death or serious bodily injury to any person; conspiratorial activities characteristic of organized crime; an immediate threat to a national security interest; or an ongoing attack on a protected computer (as defined in 18 U.S.C ) that constitutes a crime punishabl,e by a term of imprisonment greater than one year. In additiion, the operator must obtain the requisite internal approval to use a pen register before using a cell-site simulator. In order to comply with the terms ofthis policy and with 18 U.S.C. 3125, 3 the operator must contact the duty AUSA in the local U.S. Attorney's Office, who will then call the DOJ Command Center to reach a supervisory attorney in the Electroruc Surveillance Unjt (ESU) of the Office of Enforcement Operations. 4 Assuming the parameters of the statute are met, the ESU attorney will contact a DAAG in the Criminal Division 5 and provide a short briefing. If the DAAG approves, the ESU attorney will relay the verbal authorization to the AUSA, who must also apply for a court order within 48 hours as required by 18 U.S.C Under the provisions ofthe Pen Register Statute, use under emergency pen-trap authority must end when the infonnation sought is obtained, an application for an order is denied, or 48 hours has passed, whichever comes first. 2. Exceptional Circumstances Where the Law Does Not Require a Warrant There may also be other circumstances in which, although erigent circumstances do not exist, the law does not require a search warrant and circumstances make obtaining a search warrant impracticable. In such cases, which we expect to be very limited, agents must first obtain approval from executive-level personnel at the agency's headquarters and the relevant U.S. Attorney, and then from a Criminal Division DAAG. The Criminal Division shall keep track of the number of times the use of a cell-site simulator is approved under this subsection, as well as the circumstances underlying each such use. In this circumstance, the use of a cell-site simulator still must comply with the Pen Register Statute, 18 U.S.C. 3121, el seq., which ordinarily requires judicial authorization before use of the cell-site simulator, based on the government's certification that the information sought is relevant to an ongoing criminal investigation. In addition, 3 Knowing use of a pen register under emergency authorization without applying for a court order within 48 hours is a criminal violation of the Pen Register Statute, pursuant to 18 U.S.C (c). 4 In non-federal cases, the operator must contact the prosecutor and any other applicable points of conjtact for the state or local jurisdiction. 5 Jn reqiuests for emergency pen authority, and for relief under t11e exceptional circumstances provision, tbe Criminal Division DAAG will consult as appropriate with a National Security Division DAAG on matters witl1in the National Security Division's purview. 4

5 if circumstances necessitate emergency pen register authority, compliance with the provisions outlined in 18 U.S.C is required (see provisions in section 1 directly above). APPLICATIONS FOR USE OF CELL-SITE SIMULATORS When making any application to a court, the Department's lawyers and law enforcement officers must, as always, disclose appropriately and accurately the underlying purpose and activities for which an order or authorization is sought. Law enforcement agents must consult with prosecutors 6 in advance of using a cell-site simulator, and applications for the use of a cellsite simulator must include sufficient information to ensure that the courts are aware that the technology may be used Regardless of the legal authority relied upon, at the time of making an application for use of a cell-site simulator, the application or supporting affidavit should describe in general terms the technique to be employed. The description should indicate that investigators plan to send signals to the cellular phone that will cause it, and non-target phones on the same provider network in close physical proximity, to emit unique identifiers, which will be obtained by the technology, and that investigators will use the information collected to determine information pertaining to the physical location of the target cellular device or to determine the currently unknown identifiers of the target device. If investigators will use the equipment to determine unique identifiers at multiple locations and/or multiple times at the same location, the application should indicate this also. 2. An application or supporting affidavit should inform the court that the target cellular device (e.g., cell phone) and other cellular devices in the area might experience a temporary disruption of service from the service provider. The application may also note, if accurate, that any potential service disruption to non-target devices would be temporary and all operations will be conducted to ensure the minimal amount of interference to non-target devices. 3. An application for the use of a cell-site simulator should inform the court about how law enforcement intends to addlress deletion of data not associated with the target phone. The application should also inclicate that law enforcement will make no affirmative investigative use of any non-target data absent further order of the court, except to identify and distinguish the target device from other devices. 6 While this provision typicauy will implkate notification to Assistant United States Attorneys, it also extends to state and local prosecutors, where such pers01mel are engaged in operations involving cell-site simulators. 7 Courts in certain jurisdictions may require additional technical information regarding the cell-site simulator's operation (e.g., tradecraft, capabilities, limitatious or specifications). Sample applications containing such technical information are available from d1e Computer Crime and Intellectual Property Section (CCIPS) of the Criminal Division. To ensure courts receive appropriate and accurate information regarding the technical information described above, prior to filing an application that deviates from the sample filings, agents or prosecutors must contact CCIPS, which will coordinate with appropriate Department components. 5

6 DATA COLLECTION AND DISPOSAL The Department is committed to ensuring that law enforcement practices concerning the collection or retention 8 of data are lawful, and appropriately respect the important privacy interests of individuals. As part of this commitment, the Department's law enforcement agencies operate in accordance with rules, policies, and laws that control the collection, retention, dissemination, and disposition of records that contain personal identifying information. As with data collected in the course of any investigation, these authorities apply to information collected through the use of a cell-site simulator. Consistent with applicable existing laws and requirements, including any duty to preserve exculpatory evidence, 9 the Department's use of cell-site simulators shall include the following practices: 1. When the equipment is used to locate a known cellular device, all data must be deleted as soon as that device is located, and no less than once daily. 2. When the equipment is used to identify an unknown cellular device, all data must be deleted as soon as the target cellular device is identified, and in any event no less than once every 30 days. 3. Prior to deploying equipment for another mission, the operator must verify that the equipment has been cleared of any previous operational data. Agencies shall implement an auditing program to ensure that the data is deleted in the manner described above. STATE AND LOCAL PARTNERS The Department often works closely with its State and Local law enforcement partners and provides technological assistance under a variety of circumstances. This policy applies to all instances in which Department components use cell-site simulators in support of other Federal agencies and/or State and Local law enforcement agencies. TRAINING AND COORDINATION, AND ONGOING MANAGEMENT Accountability is an essential element in maintaining the integrity of our Federal law enforcement agencies. Each law enforcement agency shall provide this policy, and training as appropriate, to all relevant employees. Periodic review of this policy and training shall be the 8 In the context of this policy, the tenns "collection" and "retention" are used to address only the unique technical process of identifying dialing, routing, addressing, or signaling infonnation, as described by 18 U.S. C. 3127(3 ), emitted by cellular devices. "Collection" means the process by which unique identifier signals are obtained; "retention" refers to the period during which the dialing, routing, addressing, or signaling information is utilized to locate or identify a target device, continui ng until the point at which sucb infonnation is deleted. 9 It is not likely, given the limited type of data cell-site simulators collect (as discussed above), that exculpatory evidence would be obtained by a cell-site simulator in the course of criminal law enforcement investigations. As in other circumstances, however, to the extent investigators know or have reason to believe that infonnation is exculpatory or impeaching they have a duty to memorialize tbat information. 6

7 respornsibibty of each agency with respect to the way the equipment is being used (e.g., significant advances in technological capabilities, the kind of data collected, or the manner in which it is collected). We expect that agents will familiarize themselves with this policy and comply with all agency orders concerning the use of this technology. Each division or district office shall report to its agency headquarters annual records reflecting the total number of times a cell-site simulator is deployed in the jurisdiction; the number of deployments at the request of other agencies, including State or Local law enforcement; and the number of times the technology is deployed in emergency circumstances. Similarly, it is vital that all appropriate Department attorneys familiarize themselves with the contents of tllis policy, so that their court filings and disclosures are appropriate and consistent. Model materials will be provided to all United States Attorneys' Offices and litigating components, each of which shall conduct training for their attorneys. * * * Cell-site simulator technology significantly enhances the Department's efforts to achieve its public safety and law enforcement objectives. As with other capabilities, the Department must always use the technology in a manner that is consistent with the Constitution and all other legal authorities. This policy provides additional common principles designed to ensure that the Department continues to deploy cell-site simulators in an effective, appropriate, and consistent way. 7

Cell Site Simulator Privacy Model Bill

Cell Site Simulator Privacy Model Bill Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner

More information

Chapter 33. (CalECPA)

Chapter 33. (CalECPA) Chapter 33 Electronic Communications and Records Searches (CalECPA) Generally The California Electronic Communications Privacy Act (CalECPA): CalECPA sets forth the means by which officers may obtain electronic

More information

3121. General prohibition on pen register and trap and trace device use; exception

3121. General prohibition on pen register and trap and trace device use; exception UNITED STATES CODE ANNOTATED TITLE 18. CRIMES AND CRIMINAL PROCEDURE PART II--CRIMINAL PROCEDURE CHAPTER 206--PEN REGISTERS AND TRAP AND TRACE DEVICES 3121. General prohibition on pen register and trap

More information

CRS Report for Congress

CRS Report for Congress Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act

More information

State of Minnesota HOUSE OF REPRESENTATIVES

State of Minnesota HOUSE OF REPRESENTATIVES This Document can be made available in alternative formats upon request State of Minnesota HOUSE OF REPRESENTATIVES 1194 EIGHTY-NINTH SESSION H. F. No. 02/25/2015 Authored by Lesch, Winkler, Lucero and

More information

Non - Consensual Interception Table of Contents

Non - Consensual Interception Table of Contents Interception ISO United States Secret Service Directives System Non - Consensual Interception Table of Contents Page Introduction 1 Types of Non-Consensual Interceptions 1 Preparing for a Non-Consensual

More information

IC Chapter 5. Search and Seizure

IC Chapter 5. Search and Seizure IC 35-33-5 Chapter 5. Search and Seizure IC 35-33-5-0.1 Application of certain amendments to chapter Sec. 0.1. The amendments made to section 5 of this chapter by P.L.17-2001 apply to all actions of a

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

TekSavvy Solutions Inc.

TekSavvy Solutions Inc. TekSavvy Solutions Inc. Law Enforcement Guide TekSavvy Solutions Inc. ( TekSavvy ) is a provider of Internet access, voice telephony, and related telecommunication services. We retain subscriber information

More information

T-Mobile US, Inc. Transparency Report for 2016

T-Mobile US, Inc. Transparency Report for 2016 T-Mobile US, Inc. Transparency Report for 2016 This Transparency Report provides information about responses prepared during 2016 to legal demands for customer information. This Report includes, and makes

More information

ELECTRONIC COMMUNICATIONS PRIVACY ACT UNITED STATES CODE

ELECTRONIC COMMUNICATIONS PRIVACY ACT UNITED STATES CODE ELECTRONIC COMMUNICATIONS PRIVACY ACT UNITED STATES CODE TITLE 18 : CRIMES AND CRIMINAL PROCEDURE PART I : CRIMES CHAPTER 119 : WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL

More information

S 2403 SUBSTITUTE A ======== LC004252/SUB A ======== S T A T E O F R H O D E I S L A N D

S 2403 SUBSTITUTE A ======== LC004252/SUB A ======== S T A T E O F R H O D E I S L A N D 0 -- S 0 SUBSTITUTE A LC00/SUB A S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 0 A N A C T RELATING TO CRIMINAL PROCEDURE -- CELL PHONE TRACKING Introduced By: Senators

More information

.. " . :-., "'. ' , r ' 1, ,,1 " " ' "-. ' DEPARTMENT OF JUSTICE REPORT ON REVIEW OF NEWS MEDIA POLICIES JULY 12, 2013

..  . :-., '. ' , r ' 1, ,,1   ' -. ' DEPARTMENT OF JUSTICE REPORT ON REVIEW OF NEWS MEDIA POLICIES JULY 12, 2013 .,,,, '..., I ' 1,.. ". :-., "'. ' '.. I.., r -',,1 " " ' "-. ' DEPARTMENT OF JUSTICE REPORT ON REVIEW OF NEWS MEDIA POLICIES JULY 12, 2013 In May 2013, at the President's direction, the Attorney General

More information

ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY

ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY Page 1 of 8 02 ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY BE IT ORDAINED by the Council of the City of Berkeley as follows:

More information

CHAPTER 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS

CHAPTER 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 18 U.S.C. United States Code, 2010 Edition Title 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 121 - STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS CHAPTER 121

More information

Protecting Your Privacy

Protecting Your Privacy Protecting Your Privacy 2017 Transparency Report Contents 2 Requests for customer information 3 Number of information requests received, disclosed, rejected and contested 4 Types of disclosure requests

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

An Act to Promote Transparency and Protect Individual Rights and Liberties With Respect to Surveillance Technology

An Act to Promote Transparency and Protect Individual Rights and Liberties With Respect to Surveillance Technology An Act to Promote Transparency and Protect Individual Rights and Liberties With Respect to Surveillance Technology Findings The City Council finds it is essential to have an informed public debate as early

More information

Interstate Commission for Adult Offender Supervision

Interstate Commission for Adult Offender Supervision Interstate Commission for Adult Offender Supervision Privacy Policy Interstate Compact Offender Tracking System Version 3.0 Approved 04/23/2009 Revised on 4/18/2017 1.0 Statement of Purpose The goal of

More information

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order /3/ /5/2014

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order /3/ /5/2014 TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order 520.02 10/3/2014 10/5/2014 SUBJECT TITLE PREVIOUSLY ISSUED DATES Public Recording of Police Officer Activities N/A REFERENCE RE-EVALUATION

More information

NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES

NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES NEW BRUNSWICK POLICE DEPARTMENT POLICY & PROCEDURES VOLUME: 5 CHAPTER: 12 # OF PAGES: 14 SUBJECT: AUTOMATED license PLATE READERS BY THE ORDER OF: Anthony A. Caputo Police Director Effective Date: April

More information

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism

Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism Section 1: Short Title. This Act may be cited as the.

More information

A BILL. (a) the owner of the device and/or geolocation information; or. (c) a person to whose geolocation the information pertains.

A BILL. (a) the owner of the device and/or geolocation information; or. (c) a person to whose geolocation the information pertains. A BILL To amend title 18, United States Code, to specify the circumstances in which law enforcement may acquire, use, and keep geolocation information. Be it enacted by the Senate and House of Representatives

More information

CITY OF ONALASKA POLICE DEPARTMENT

CITY OF ONALASKA POLICE DEPARTMENT CITY OF ONALASKA POLICE DEPARTMENT Policy: Arrest Procedures Policy # 17 Pages: 13 Approved by F & P Committee: 04/02/11 Approved by Common Council: 04/08/11 Initial Issue Date: 01/31/98 Revised dates:

More information

UC Davis Police Department USE OF FORCE PAGE 1 OF 5

UC Davis Police Department USE OF FORCE PAGE 1 OF 5 PAGE 1 OF 5 PURPOSE: This policy recognizes that the use of force by law enforcement requires constant evaluation. Even at its lowest level the use of force is a serious responsibility. The purpose of

More information

Case 9:18-mj BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13

Case 9:18-mj BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13 Case 9:18-mj-08461-BER Document 2 Entered on FLSD Docket 11/30/2018 Page 1 of 13 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA Case No. 18-8461-BER IN RE: APPLICATION OF THE UNITED STATES OF

More information

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE

THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE THE SURVEILLANCE AND COMMUNITY SAFETY ORDINANCE Whereas, the City Council finds it is essential to have an informed public debate as early as possible about decisions related to surveillance technology;

More information

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland

Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Translation from Finnish Legally binding only in Finnish and Swedish Ministry of the Interior, Finland Act on the Processing of Personal Data by the Border Guard (579/2005; amendments up to 1072/2015 included)

More information

United States District Court,District of Columbia.

United States District Court,District of Columbia. United States District Court,District of Columbia. In the Matter of the Application of the UNITED STATES OF AMERICA FOR AN ORDER AUTHORIZING THE RELEASE OF PROSPECTIVE CELL SITE INFORMATION No. MISC.NO.05-508

More information

Model Act to Permit Continued Access by Law Enforcement to Wire & Electronic Communications

Model Act to Permit Continued Access by Law Enforcement to Wire & Electronic Communications Model Act to Permit Continued Access by Law Enforcement to Wire & Electronic Communications Table of Contents D-77 Policy Statement D-79 Highlights Section One D-81 Short Title Section Two D-81 Legislative

More information

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm.

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm. Chart comparing current law, S. 1692 (PATRIOT Act Sunset Extension Act) as reported by Senate Judiciary Committee, and H.R. 3845 (USA Patriot Amendments Act of 2009) as reported by the House Judiciary

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

Duluth PD Mobile Video Recorder Policy PURPOSE AND SCOPE

Duluth PD Mobile Video Recorder Policy PURPOSE AND SCOPE Policy 419 Duluth PD Mobile Video Recorder Policy 419.1 PURPOSE AND SCOPE The Duluth Police Department has equipped marked patrol cars and law enforcement operators with Mobile Video Recording (MVR) systems.

More information

TOP SECRET!/COMOO'//NO.i'ORN

TOP SECRET!/COMOO'//NO.i'ORN TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman

More information

T-Mobile Transparency Report for 2013 and 2014

T-Mobile Transparency Report for 2013 and 2014 T-Mobile Transparency Report for 2013 and 2014 This Transparency Report provides information about requests from law enforcement agencies and others for customer information we 1 received in 2013 and 2014

More information

Policy Tualatin Police Department. Policy Manual

Policy Tualatin Police Department. Policy Manual Policy Tualatin Police Department 300.1 PURPOSE AND SCOPE This policy recognizes that the use of force by law enforcement requires constant evaluation. Even at its lowest level, the use of force is a serious

More information

u.s. Department of Justice

u.s. Department of Justice u.s. Department of Justice Office of the Deputy Attorney General The Depmy All rncy GcncraJ HiISilillglOlI. D.C. 20530 March 30, 2011 MEMORANDUM FOR THE ASSOCIATE ATTORNEY GENERAL AND THE ASSIST ANT ATTORNEYS

More information

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Gina Stevens Legislative Attorney Charles Doyle Senior Specialist in American Public Law October 9,

More information

Telecommunications Information Privacy Code 2003

Telecommunications Information Privacy Code 2003 Telecommunications Information Privacy Code 2003 Incorporating Amendments No 3, No 4, No 5 and No 6 Privacy Commissioner Te Mana Matapono Matatapu NEW ZEALAND This version of the code applies from 2 8

More information

Body Worn Camera Policy

Body Worn Camera Policy Policy 418 Body Worn Camera Policy 418.1 PURPOSE AND SCOPE The has equipped law enforcement operators with Body Worn Camera (BWC) systems. The purpose of this policy is to provide guidelines for the use,

More information

CHAPTER Senate Bill No. 2252

CHAPTER Senate Bill No. 2252 CHAPTER 2000-369 Senate Bill No. 2252 An act relating to law enforcement communications; providing for a review panel to evaluate and select a strategy to complete implementation of the statewide law enforcement

More information

DEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense.

DEFINITIONS. Accuse To bring a formal charge against a person, to the effect that he is guilty of a crime or punishable offense. DEFINITIONS Words and Phrases The following words and phrases have the meanings indicated when used in this chapter according to Black s Law Dictionary, common dictionary, and/or are distinctive to law

More information

UNMANNED AERIAL SYSTEMS LEGISLATION: STATE COMPARISON CHART

UNMANNED AERIAL SYSTEMS LEGISLATION: STATE COMPARISON CHART STATE BILL # STATUS OF BILL Florida FSA 934.50 effective as of July 1, 2013 Idaho I.C. 21-213 effective as of July 1, 2013. Illinois 725 Ill. Comp. Stat. 167/1 et seq. effective as of January 1, 2014.

More information

BAKERSFIELD POLICE MEMORANDUM

BAKERSFIELD POLICE MEMORANDUM BAKERSFIELD POLICE MEMORANDUM To: From: All Personnel Dennis West, Lieutenant Planning, Research and Training Date: June 2, 2014 Subject: Use of Force Policy Update Policy 300 Use of Force, has been updated.

More information

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation

H. R (1) AMENDMENT. Chapter 121 of title 18, United States Code, is amended by adding at the end the following: Required preservation DIVISION V CLOUD ACT SEC. 101. SHORT TITLE. This division may be cited as the Clarifying Lawful Overseas Use of Data Act or the CLOUD Act. SEC. 102. CONGRESSIONAL FINDINGS. Congress finds the following:

More information

Surveillance Devices Act 2007 No 64

Surveillance Devices Act 2007 No 64 New South Wales Surveillance Devices Act 2007 No 64 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Relationship to other laws and matters 2 4 Definitions 2 5 Eligible Judges

More information

Attorney General Law Enforcement Directive No

Attorney General Law Enforcement Directive No Attorney General Law Enforcement Directive No. 2015-1 AG Directive No. 2015-1 was issued to provide guidance to police departments on the use and deployment of BWCs. The Directive is intended to establish

More information

TELUS Transparency Report

TELUS Transparency Report TELUS is a national telecommunications company, and as such, law enforcement agencies and government organizations regularly contact us to request specific information about our customers. This transparency

More information

Department of Legislative Services Maryland General Assembly 2011 Session

Department of Legislative Services Maryland General Assembly 2011 Session Department of Legislative Services Maryland General Assembly 2011 Session HB 599 FISCAL AND POLICY NOTE House Bill 599 Judiciary (Delegates Waldstreicher and Rosenberg) Courts and Judicial Proceedings

More information

DEPARTMENT POLICIES AND PROCEDURES

DEPARTMENT POLICIES AND PROCEDURES MADISON POLICE DEPARTMENT 1-4 SECTION: TITLE: ADMINISTRATION Response to Resistance REVISED: April 2, 201 Date Issued: January 12, 201 CALEA Standards: 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3., 1.3.7, 1.3.8,

More information

SURVEILLANCE DEVICES ACT 1999

SURVEILLANCE DEVICES ACT 1999 Consolidated as in force on 1 January 2010 SURVEILLANCE DEVICES ACT 1999 Act No. 21, 1999 Subordinate legislation Subordinate legislation repealed prior to January 2000 is not included in this list. SURVEILLANCE

More information

Association of Law Enforcement Intelligence Units

Association of Law Enforcement Intelligence Units Association of Law Enforcement Intelligence Units Your Voice at the National Level! An International Law Enforcement Intelligence Network Founded in 1956 0 Revised: July 25, 2011 ASSOCIATION OF LAW ENFORCEMENT

More information

State of New Jersey OFFICE OF THE ATTORNEY GZNEP.A~ DEPARTMENT OF LAW AND PUBLIC SAFETY PO Box 080 TRENTON, NJ DIRECTIVE NO.

State of New Jersey OFFICE OF THE ATTORNEY GZNEP.A~ DEPARTMENT OF LAW AND PUBLIC SAFETY PO Box 080 TRENTON, NJ DIRECTIVE NO. CHRIS CHRISTIE Governor KIM GUADAGNO Lieutenant Governor State of New Jersey OFFICE OF THE ATTORNEY GZNEP.A~ DEPARTMENT OF LAW AND PUBLIC SAFETY PO Box 080 TRENTON, NJ 08625-0080 PAULA T. Dow Attorney

More information

DATA PROTECTION LAWS OF THE WORLD. South Korea

DATA PROTECTION LAWS OF THE WORLD. South Korea DATA PROTECTION LAWS OF THE WORLD South Korea Downloaded: 31 August 2018 SOUTH KOREA Last modified 26 January 2017 LAW In the past, South Korea did not have a comprehensive law governing data privacy.

More information

AR 15-6 Investigating Officer's Guide

AR 15-6 Investigating Officer's Guide AR 15-6 Investigating Officer's Guide A. INTRODUCTION 1. Purpose: This guide is intended to assist investigating officers who have been appointed under the provisions of Army Regulation (AR) 15-6, in conducting

More information

Pasadena Police Department Policy Manual

Pasadena Police Department Policy Manual Policy 300 Pasadena Police Department 300.1 PURPOSE AND SCOPE This policy provides guidelines on the reasonable use of force. While there is no way to specify the exact amount or type of reasonable force

More information

ORDINANCE _ BOROUGH OF NEW ALBANY BRADFORD COUNTY, PENNSYLVANIA

ORDINANCE _ BOROUGH OF NEW ALBANY BRADFORD COUNTY, PENNSYLVANIA ORDINANCE _2015-2 BOROUGH OF NEW ALBANY BRADFORD COUNTY, PENNSYLVANIA AN ORDINANCE, ADOPTING CHAPTER, SECURITY CAMERA SYSTEMS, PUBLIC, OF THE CODE OF THE BOROUGH OF NEW ALBANY, COUNTY OF BRADFORD, COMMONWEALTH

More information

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD

LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD LAW ENFORCEMENT ASSISTANCE VODAFONE GLOBAL POLICY STANDARD Objective/Risk Create the governance and safeguards necessary to ensure we appropriately balance respect for our customers right to privacy and

More information

Volume_ 1 Page 1 of USE OF FORCE POLICY ON THE USE OF FORCE.

Volume_ 1 Page 1 of USE OF FORCE POLICY ON THE USE OF FORCE. Volume_ 1 Page 1 of 5 556. USE OF FORCE. 556.10 POLICY ON THE USE OF FORCE. PREAMBLE TO USE OF FORCE. The use of force by members of law enforcement is a matter of critical concern both to the public and

More information

Santa Cruz Police Department Santa Cruz Police Department Policy Manual

Santa Cruz Police Department Santa Cruz Police Department Policy Manual Policy 300 Santa Cruz Police Department 300.1 PURPOSE AND SCOPE This policy recognizes that the use of force by law enforcement requires constant evaluation. Even at its lowest level, the use of force

More information

Protecting the Privilege When the Government Executes a Search Warrant

Protecting the Privilege When the Government Executes a Search Warrant Protecting the Privilege When the Government Executes a Search Warrant By Sara Kropf, Law Office of Sara Kropf PLLC Government investigative techniques traditionally reserved for street crime cases search

More information

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD. Recommendations Assessment Report

PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD. Recommendations Assessment Report PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Recommendations Assessment Report JANUARY 29, 2015 Privacy and Civil Liberties Oversight Board David Medine, Chairman Rachel Brand Elisebeth Collins Cook James

More information

15-6 Investigation Officer Guidelines

15-6 Investigation Officer Guidelines 15-6 Investigation Officer Guidelines 1. PURPOSE: a. This guide is intended to assist investigating officers, who have been appointed under the provisions of Army Regulation (AR) 15-6, in conducting timely,

More information

Attack of the Drones: Illegal Use of Unmanned Aircraft in Texas Regional Judges Seminar FY 2015 Robby Chapman, Program Director, TMCEC

Attack of the Drones: Illegal Use of Unmanned Aircraft in Texas Regional Judges Seminar FY 2015 Robby Chapman, Program Director, TMCEC Attack of the Drones: Illegal Use of Unmanned Aircraft in Texas Regional Judges Seminar FY 2015 Robby Chapman, Program Director, TMCEC OUTLINE NOTES A. What are drones? a. Definitions b. Practical drone

More information

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as "the Contracting Parties";

The Government of the United States of America and the Government of the Swiss Confederation, hereinafter referred to as the Contracting Parties; Draft AGREEMENT BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE SWISS CONFEDERATION REGARDING MUTUAL ASSISTANCE BETWEEN THEIR CUSTOMS ADMINISTRATIONS The Government of

More information

Lexipol Illinois Policy Manual

Lexipol Illinois Policy Manual Policy 300 Lexipol Illinois 300.1 PURPOSE AND SCOPE This policy provides guidelines on the reasonable use of force. While there is no way to specify the exact amount or type of reasonable force to be applied

More information

Using the New York State Freedom of Information Law

Using the New York State Freedom of Information Law Using the New York State Freedom of Information Law What part of government is covered by FOIL? What information can be obtained under FOIL? o Agency Records o Legislative Records Agency Records Access

More information

Notes on how to read the chart:

Notes on how to read the chart: To better understand how the USA FREEDOM Act amends the Foreign Intelligence Surveillance Act of 1978 (FISA), the Westin Center created a redlined version of the FISA reflecting the FREEDOM Act s changes.

More information

IC Chapter 2.5. Home Detention

IC Chapter 2.5. Home Detention IC 35-38-2.5 Chapter 2.5. Home Detention IC 35-38-2.5-1 Offenders to which chapter applies Sec. 1. This chapter applies to adult offenders and to juveniles who have committed a delinquent act that would

More information

USE OF FORCE / USE OF FORCE IN RESPONSE TO THREAT/NON-COMPLIANCE

USE OF FORCE / USE OF FORCE IN RESPONSE TO THREAT/NON-COMPLIANCE Policy 300 Bellingham Police Department USE OF FORCE / USE OF FORCE IN RESPONSE TO THREAT/NON-COMPLIANCE 300.1 PURPOSE AND SCOPE This policy provides guidelines on the reasonable use of force and the reasonable

More information

UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT. August Term Heard: September 29, 2016 Decided: December 1, Docket Nos.

UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT. August Term Heard: September 29, 2016 Decided: December 1, Docket Nos. 15-387 United States of America v. Gilliam UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT August Term 2016 Heard: September 29, 2016 Decided: December 1, 2016 Docket Nos. 15-387 - - - - - - - -

More information

Surveillance Devices Act 2007

Surveillance Devices Act 2007 Surveillance Devices Act 2007 As at 3 April 2013 Long Title An Act to regulate the installation, use, maintenance and retrieval of surveillance devices; to repeal the Listening Devices Act 1984; and for

More information

IN THE SENATE OF THE UNITED STATES 111th Cong., 1st Sess. S. 1692

IN THE SENATE OF THE UNITED STATES 111th Cong., 1st Sess. S. 1692 AMENDMENT NO.llll Purpose: In the nature of a substitute. Calendar No.lll IN THE SENATE OF THE UNITED STATES th Cong., st Sess. S. To extend the sunset of certain provisions of the USA PA- TRIOT Act and

More information

The NICS Improvement Amendments Act: State Estimates of Available Records Information Collection

The NICS Improvement Amendments Act: State Estimates of Available Records Information Collection The NICS Improvement Amendments Act: State Estimates of Available Records Information Collection I. INTRODUCTION This form has been developed pursuant to the National Instant Criminal Background Check

More information

Fragomen Privacy Notice

Fragomen Privacy Notice Effective Date: May 14, 2018 Fragomen Privacy Notice Fragomen, Del Rey, Bernsen & Loewy, LLP, Fragomen Global LLP, and our related affiliates and subsidiaries 1 (collectively, Fragomen or "we") want to

More information

Regulation of Interception of Act 18 Communications Act 2010

Regulation of Interception of Act 18 Communications Act 2010 ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception

More information

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175--

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175-- H.R.3162 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (Enrolled Bill (Sent to President)) SEC. 817. EXPANSION

More information

Strike all after the enacting clause and insert the

Strike all after the enacting clause and insert the F:\PKB\JD\FISA0\H-FLR-ANS_00.XML AMENDMENT IN THE NATURE OF A SUBSTITUTE TO H.R., AS REPORTED BY THE COM- MITTEE ON THE JUDICIARY AND THE PERMA- NENT SELECT COMMITTEE ON INTELLIGENCE OFFERED BY MR. SENSENBRENNER

More information

Obtaining Information From Financial Institutions

Obtaining Information From Financial Institutions Army Regulation 190 6 Military Police Obtaining Information From Financial Institutions Headquarters Department of the Army Washington, DC 9 February 2006 UNCLASSIFIED SUMMARY of CHANGE AR 190 6 Obtaining

More information

TERRORISM (SUPPRESSION OF FINANCING) ACT. Act 16 of 2002

TERRORISM (SUPPRESSION OF FINANCING) ACT. Act 16 of 2002 TERRORISM (SUPPRESSION OF FINANCING) ACT Act 16 of 2002 Short title 1. This Act may be cited as the Terrorism (Suppression of Financing) Act. Interpretation 2. (1) In this Act, unless the context otherwise

More information

Electronic Searches and Surveillance ( )

Electronic Searches and Surveillance ( ) Electronic Searches and Surveillance (4-27-17) Table of Contents Introduction 2 Historical Context (Case Law) 2 Statutes Codifying Case Law 5 Title III (Wiretapping) 5 Stored Communications and Transactional

More information

Data Protection REFERENCE NUMBER. IMPLEMENTATION DATE June 2014 NEXT REVIEW DATE: September 2020 RISK RATING

Data Protection REFERENCE NUMBER. IMPLEMENTATION DATE June 2014 NEXT REVIEW DATE: September 2020 RISK RATING POLICY Security Classification Disclosable under Freedom of Information Act 2000 Yes POLICY TITLE Data Protection REFERENCE NUMBER A031 Version 1.1 POLICY OWNERSHIP DIRECTORATE BUSINESS AREA CHIEF OFFICERS

More information

Location Privacy: The Legal Landscape. David L. Sobel Senior Counsel, EFF Stanford PNT Symposium October 29, 2014

Location Privacy: The Legal Landscape. David L. Sobel Senior Counsel, EFF Stanford PNT Symposium October 29, 2014 Location Privacy: The Legal Landscape David L. Sobel Senior Counsel, EFF Stanford PNT Symposium October 29, 2014 Overview Increasing public concern about location tracking Tracking by both government actors

More information

WORKING DRAFT REVISE AS NEEDED

WORKING DRAFT REVISE AS NEEDED WORKING DRAFT REVISE AS NEEDED An Act To Promote Transparency and Protect Civil Rights and Civil Liberties With Respect to Surveillance Technology The City Council finds it is essential to have an informed

More information

DURHAM CONSTABULARY POLICY

DURHAM CONSTABULARY POLICY DURHAM CONSTABULARY POLICY Durham Constabulary Freedom of Information Act Publication Scheme Name of Policy Body Worn Video Devices Registry Reference No. DCP 166 Policy Owner Head of Neighbourhood & Partnership

More information

TITLE 18 CRIMES AND CRIMINAL PROCEDURE

TITLE 18 CRIMES AND CRIMINAL PROCEDURE 2510 TITLE 18 CRIMES AND CRIMINAL PROCEDURE Page 542 Central Intelligence Agency or by any individual acting on behalf of the Central Intelligence Agency in connection with the program addressed in this

More information

Chief of Police: Review Date: July 1

Chief of Police: Review Date: July 1 Directive Type: General Order Effective Date 05-17-2016 General Order Number: 05.09 Subject: Legal Process and Court Appearances Amends/Supersedes: Section 05, Chapter 09, Legal Process, revised 2008 Distribution:

More information

Case 3:16-cv EDL Document 1 Filed 08/29/16 Page 1 of 15

Case 3:16-cv EDL Document 1 Filed 08/29/16 Page 1 of 15 Case :-cv-0-edl Document Filed 0// Page of Case :-cv-0-edl Document Filed 0// Page of 0 National Basketball Association ( NBA ), combining its success on the court with its desire to be at the forefront

More information

PRIVACY MANAGEMENT PLAN

PRIVACY MANAGEMENT PLAN PRIVACY MANAGEMENT PLAN September 2015 Contents 1. Introduction... 3 1.2 Purpose... 3 1.3 Scope... 3 1.3 Section 41 Directions... 3 1.4 Complaints... 4 2. Definitions... 4 2.1 Personal Information... 4

More information

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF HOW COMPANIES ENGAGED IN TRANSPARENCY REPORTING CATEGORIZE & DEFINE U.S. GOVERNMENT LEGAL PROCESSES DEMANDING USER DATA, AND IDENTIFICATION

More information

CITIZEN OBSERVATION/RECORDING OF OFFICERS

CITIZEN OBSERVATION/RECORDING OF OFFICERS Subject Date Published Page 1 July 2016 1 of 5 By Order of the Police Commissioner POLICY 1. Citizen s Right to Observe. It is the policy of the Baltimore Police Department (BPD) that people not involved

More information

Overview of the Act on the Protection of Specially Designated Secrets (SDS)

Overview of the Act on the Protection of Specially Designated Secrets (SDS) Overview of the Act on the Protection of Specially Designated Secrets (SDS) Cabinet Secretariat Preparatory Office for Enforcement of the Act on the Protection of Specially Designated Secrets Overview

More information

Discipline Committee Guidelines

Discipline Committee Guidelines Discipline Committee Guidelines October 2015 Table Of Contents Introduction 2 Disclosure by the College 2 Pre-Hearing Conferences 3 Hearing Dates 5 Procedural and Interlocutory Motions 5 Motion Materials

More information

Agreement for iseries and AS/400 System Restore Test Service

Agreement for iseries and AS/400 System Restore Test Service Agreement for iseries and AS/400 System Restore Test Service 1. Introduction The iseries and AS/400 System Restore Test Service (called "the Service"). The Service is provided to you, as a registered subscriber

More information

H.R The 2001 Anti-Terrorism Legislation [Pub. L. No (Oct. 26, 2001)]

H.R The 2001 Anti-Terrorism Legislation [Pub. L. No (Oct. 26, 2001)] H.R. 3162 The 2001 Anti-Terrorism Legislation [Pub. L. No. 107-56 (Oct. 26, 2001)] Abridged Provisions Relating to Obtaining Electronic Evidence and Others of Interest to State & Local Law Enforcers With

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY COUNTY RECORDS MANAGEMENT AND ARCHIVES POLICY A-43 1 of 13 Background... 2 Part A. County Records and Information Management... 3 Section A. General... 3 Section A.1. Authority... 3 Section A.2. Program

More information

Briefing from Carpenter v. United States

Briefing from Carpenter v. United States Written Material for Inside Oral Argument Briefing from Carpenter v. United States The mock oral argument will be based Carpenter v. United States, which is pending before the Supreme Court of the United

More information

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background Charles Doyle Senior Specialist in American Public Law July 31, 2015 Congressional Research Service 7-5700

More information

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Presented to Parliament under section 377A(4) of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A

More information

Act on the Protection of Specially Designated Secrets

Act on the Protection of Specially Designated Secrets Act on the Protection of Specially Designated Secrets (Act No. 108 of December 13, 2013) Table of Contents Chapter I General Provisions (Articles 1 and 2) Chapter II Designation of Specially Designated

More information